Analysis
-
max time kernel
99s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2023, 19:09
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://klick.publikator.se?K=0&BREV_ID=316&UID=394913&[email protected]&URL=https://36docus1port5.com/[email protected]
Resource
win10v2004-20231023-en
General
-
Target
https://klick.publikator.se?K=0&BREV_ID=316&UID=394913&[email protected]&URL=https://36docus1port5.com/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133438577934420324" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2756 chrome.exe 2756 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2756 chrome.exe Token: SeCreatePagefilePrivilege 2756 chrome.exe Token: SeShutdownPrivilege 2756 chrome.exe Token: SeCreatePagefilePrivilege 2756 chrome.exe Token: SeShutdownPrivilege 2756 chrome.exe Token: SeCreatePagefilePrivilege 2756 chrome.exe Token: SeShutdownPrivilege 2756 chrome.exe Token: SeCreatePagefilePrivilege 2756 chrome.exe Token: SeShutdownPrivilege 2756 chrome.exe Token: SeCreatePagefilePrivilege 2756 chrome.exe Token: SeShutdownPrivilege 2756 chrome.exe Token: SeCreatePagefilePrivilege 2756 chrome.exe Token: SeShutdownPrivilege 2756 chrome.exe Token: SeCreatePagefilePrivilege 2756 chrome.exe Token: SeShutdownPrivilege 2756 chrome.exe Token: SeCreatePagefilePrivilege 2756 chrome.exe Token: SeShutdownPrivilege 2756 chrome.exe Token: SeCreatePagefilePrivilege 2756 chrome.exe Token: SeShutdownPrivilege 2756 chrome.exe Token: SeCreatePagefilePrivilege 2756 chrome.exe Token: SeShutdownPrivilege 2756 chrome.exe Token: SeCreatePagefilePrivilege 2756 chrome.exe Token: SeShutdownPrivilege 2756 chrome.exe Token: SeCreatePagefilePrivilege 2756 chrome.exe Token: SeShutdownPrivilege 2756 chrome.exe Token: SeCreatePagefilePrivilege 2756 chrome.exe Token: SeShutdownPrivilege 2756 chrome.exe Token: SeCreatePagefilePrivilege 2756 chrome.exe Token: SeShutdownPrivilege 2756 chrome.exe Token: SeCreatePagefilePrivilege 2756 chrome.exe Token: SeShutdownPrivilege 2756 chrome.exe Token: SeCreatePagefilePrivilege 2756 chrome.exe Token: SeShutdownPrivilege 2756 chrome.exe Token: SeCreatePagefilePrivilege 2756 chrome.exe Token: SeShutdownPrivilege 2756 chrome.exe Token: SeCreatePagefilePrivilege 2756 chrome.exe Token: SeShutdownPrivilege 2756 chrome.exe Token: SeCreatePagefilePrivilege 2756 chrome.exe Token: SeShutdownPrivilege 2756 chrome.exe Token: SeCreatePagefilePrivilege 2756 chrome.exe Token: SeShutdownPrivilege 2756 chrome.exe Token: SeCreatePagefilePrivilege 2756 chrome.exe Token: SeShutdownPrivilege 2756 chrome.exe Token: SeCreatePagefilePrivilege 2756 chrome.exe Token: SeShutdownPrivilege 2756 chrome.exe Token: SeCreatePagefilePrivilege 2756 chrome.exe Token: SeShutdownPrivilege 2756 chrome.exe Token: SeCreatePagefilePrivilege 2756 chrome.exe Token: SeShutdownPrivilege 2756 chrome.exe Token: SeCreatePagefilePrivilege 2756 chrome.exe Token: SeShutdownPrivilege 2756 chrome.exe Token: SeCreatePagefilePrivilege 2756 chrome.exe Token: SeShutdownPrivilege 2756 chrome.exe Token: SeCreatePagefilePrivilege 2756 chrome.exe Token: SeShutdownPrivilege 2756 chrome.exe Token: SeCreatePagefilePrivilege 2756 chrome.exe Token: SeShutdownPrivilege 2756 chrome.exe Token: SeCreatePagefilePrivilege 2756 chrome.exe Token: SeShutdownPrivilege 2756 chrome.exe Token: SeCreatePagefilePrivilege 2756 chrome.exe Token: SeShutdownPrivilege 2756 chrome.exe Token: SeCreatePagefilePrivilege 2756 chrome.exe Token: SeShutdownPrivilege 2756 chrome.exe Token: SeCreatePagefilePrivilege 2756 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2112 2756 chrome.exe 83 PID 2756 wrote to memory of 2112 2756 chrome.exe 83 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 4924 2756 chrome.exe 89 PID 2756 wrote to memory of 3280 2756 chrome.exe 90 PID 2756 wrote to memory of 3280 2756 chrome.exe 90 PID 2756 wrote to memory of 792 2756 chrome.exe 91 PID 2756 wrote to memory of 792 2756 chrome.exe 91 PID 2756 wrote to memory of 792 2756 chrome.exe 91 PID 2756 wrote to memory of 792 2756 chrome.exe 91 PID 2756 wrote to memory of 792 2756 chrome.exe 91 PID 2756 wrote to memory of 792 2756 chrome.exe 91 PID 2756 wrote to memory of 792 2756 chrome.exe 91 PID 2756 wrote to memory of 792 2756 chrome.exe 91 PID 2756 wrote to memory of 792 2756 chrome.exe 91 PID 2756 wrote to memory of 792 2756 chrome.exe 91 PID 2756 wrote to memory of 792 2756 chrome.exe 91 PID 2756 wrote to memory of 792 2756 chrome.exe 91 PID 2756 wrote to memory of 792 2756 chrome.exe 91 PID 2756 wrote to memory of 792 2756 chrome.exe 91 PID 2756 wrote to memory of 792 2756 chrome.exe 91 PID 2756 wrote to memory of 792 2756 chrome.exe 91 PID 2756 wrote to memory of 792 2756 chrome.exe 91 PID 2756 wrote to memory of 792 2756 chrome.exe 91 PID 2756 wrote to memory of 792 2756 chrome.exe 91 PID 2756 wrote to memory of 792 2756 chrome.exe 91 PID 2756 wrote to memory of 792 2756 chrome.exe 91 PID 2756 wrote to memory of 792 2756 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://klick.publikator.se?K=0&BREV_ID=316&UID=394913&[email protected]&URL=https://36docus1port5.com/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffe2e419758,0x7ffe2e419768,0x7ffe2e4197782⤵PID:2112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1900,i,7251185907489683461,9836176136786743477,131072 /prefetch:22⤵PID:4924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1900,i,7251185907489683461,9836176136786743477,131072 /prefetch:82⤵PID:3280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1900,i,7251185907489683461,9836176136786743477,131072 /prefetch:82⤵PID:792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3100 --field-trial-handle=1900,i,7251185907489683461,9836176136786743477,131072 /prefetch:12⤵PID:1364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3120 --field-trial-handle=1900,i,7251185907489683461,9836176136786743477,131072 /prefetch:12⤵PID:4136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4384 --field-trial-handle=1900,i,7251185907489683461,9836176136786743477,131072 /prefetch:12⤵PID:1312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3404 --field-trial-handle=1900,i,7251185907489683461,9836176136786743477,131072 /prefetch:12⤵PID:3852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3336 --field-trial-handle=1900,i,7251185907489683461,9836176136786743477,131072 /prefetch:12⤵PID:1628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5536 --field-trial-handle=1900,i,7251185907489683461,9836176136786743477,131072 /prefetch:82⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 --field-trial-handle=1900,i,7251185907489683461,9836176136786743477,131072 /prefetch:82⤵PID:2380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3392 --field-trial-handle=1900,i,7251185907489683461,9836176136786743477,131072 /prefetch:12⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD537be34526ee523ff38e845f82424cbf4
SHA13e0a0d5c0187d889f914000d0d0f36aa0523dcbd
SHA25622fd33d6320dc4e17ed30c18c91ec1f3c032bd2f1355302b634095662d976bb4
SHA5124f2eb3aefa789244a02a7f6bd9859f7de2d7358f3a71cc4dce0fafe8565430ed1e9a8ec56c484f3fdd00ff52efe20f02b199dd956e5297e012af0deacf6248d7
-
Filesize
120B
MD589006a957242cc4faa95b72d72c78811
SHA15233d31098147aa97a1b37ef00f44ad24eb802c0
SHA256a9c64eb07518bbcec3c84173abff80143723ad07fc2c91ef475164744fec9e79
SHA5123d753741bd5556eba21ad39fd07bae1f155522c79c0517175b05e7a5a33ee92e59991926a85a2d3cb3f6fb18ad57b6641e28c55b216f4c93c8dd8eba9cd1ce86
-
Filesize
2KB
MD528829d6b4c770798d235e788f33c40eb
SHA1b192a106d48af0f3b7c85d9fbc7cb1557a8e5f5d
SHA25673b358d2b5cf2659bcc56936d0193f9a3677f871a0dc6810d06ace20d5e9d9c5
SHA51224bad03ad226a52d21b43ddc75ae15f80f6beffa5031a51df013d406555235503cb5c4a5728407e00ea9059361c6bc8659c9483fa463e34929a1d0a3dd75f928
-
Filesize
538B
MD53b5ea09cac970925ebd180c6ad371de9
SHA133f7fb997625b39933f512749454ceb4a821b3e4
SHA256cda6a863505346eadc5b34b4575c1a17ad98190eb1c7ae605769e7326c6249a7
SHA5127b90b3452f6cef1aced5633ed25eb09d9a9a9070ce8d080b58818f92435329d697ee5abcecadd26d547afe10c9a51495fa8a78ec902c0cb4b343486703446376
-
Filesize
6KB
MD5fe7a4a821748de896588c0ebaba98364
SHA18a8de954f321a1fb9053c3455183dceb0d352261
SHA256d53d41706140c37a7c720693082a04a977690e5fd5f05abc244bb152e941b7ef
SHA5128c1ce5d948d66c18e5ea763adfd57554ec8b8a1059ac41963f6e8566bcf3b018e1afcc3b4106e4667ece87dd34a0d062ede3a0c51c1bdb97ec825c3bae01f29e
-
Filesize
5KB
MD54aa1b707cec3290d59d7664cfe1595b1
SHA1622c79efdf1a8a18904a673867dd6cf7e2c5d615
SHA256f4ea07893bdf0dd68cc6792b9f40775e2110548916c2ba6507781951201f46a2
SHA512b052e8e5560181c4143aeca6d08c80e6fda28793ffc8c4dd4fcd9a7d18e76852f3bd722707d4d0dd7a1876cb3c440367f5b6f29c4480ab95303ef45f0d7ec5fa
-
Filesize
5KB
MD54b578dad8752808b3e2c96b787392ecf
SHA1a753382f660015ed4403edea87ad330b72b80dd8
SHA2565058b52dcd69d7f26be7d64c30381af11d3603f4c27f427a1e3d9404bb1411c2
SHA512d1c503b21fc5656b7ac4a93eae5d732eb3bb3d73764f648782c08784c793135863c19f42b13c7be6905ff4a2a8fa79556e6c2387294965597925184d29e8db6c
-
Filesize
5KB
MD5d9181498a401fbc390e8b8e5f02d4d87
SHA10b0ec9080420333fe20b66f460d6da79209ed3f9
SHA2560a57245d71206cc2c74ce24c0ed060d94c7bb379a0d7f1a7a6b83da2746d5dc9
SHA5124b241f50d90d634d9f42ec6661d16e4a084b9e49c313638e5b38e7377a3bb78f34702f0509738db781668e6957f5683edffd745901f56f59e22440bf8c0fa079
-
Filesize
109KB
MD5a95273f03ee5fe7ad7a526cdd91be3f6
SHA1b7941103f57267399909e5fd55129b1379934055
SHA25650c0a748a64484d851262b8c349b51c7258529751a5160f3f0101e4b371c89b2
SHA512efc85c4d77175b374b15b61d797ab0813899e784c003aad72f8b50699fa5b74a916893293daa7ea2e33d4ed7c72bc74742e37c54e7eb8554dcabfd82b7c5a651
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd